2026-05-12 21:6CVE-2026-44871hpe
PUBLISHED5.2

Authenticated Command Injection Vulnerabilities in Command Line Interface (CLI) Service Accessed by PAPI Protocol of AOS-8 and AOS-10 Operating Systems

Command injection vulnerabilities exist in the command line interface (CLI) service accessed by the PAPI protocol of AOS-8 and AOS-10 Operating Systems. Successful exploitation of these vulnerabilities could allow an authenticated remote attacker to execute arbitrary commands on the underlying operating system.

Affected products

Hewlett Packard Enterprise (HPE)

HPE Aruba Networking Wireless Operating System (AOS)

<= 8.13.1.1 - AFFECTED

<= 8.12.0.6 - AFFECTED

<= 8.10.0.21 - AFFECTED

<= 10.7.2.2 - AFFECTED

10.8.0.0 - AFFECTED

<= 10.4.1.10 - AFFECTED

References

GitHub Security Advisories

GHSA-hrpm-mj96-8vfp

Command injection vulnerabilities exist in the command line interface (CLI) service accessed by...

https://github.com/advisories/GHSA-hrpm-mj96-8vfp

Command injection vulnerabilities exist in the command line interface (CLI) service accessed by the PAPI protocol of AOS-8 and AOS-10 Operating Systems. Successful exploitation of these vulnerabilities could allow an authenticated remote attacker to execute arbitrary commands on the underlying operating system.

JSON source

https://cveawg.mitre.org/api/cve/CVE-2026-44871
Click to expand
{
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "cveMetadata": {
    "cveId": "CVE-2026-44871",
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "dateUpdated": "2026-05-12T21:06:12.315Z",
    "dateReserved": "2026-05-07T21:29:22.242Z",
    "datePublished": "2026-05-12T21:06:12.315Z",
    "state": "PUBLISHED"
  },
  "containers": {
    "cna": {
      "providerMetadata": {
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe",
        "dateUpdated": "2026-05-12T21:06:12.315Z"
      },
      "title": "Authenticated Command Injection Vulnerabilities in Command Line Interface (CLI) Service Accessed by PAPI Protocol of AOS-8 and AOS-10 Operating Systems",
      "descriptions": [
        {
          "lang": "en",
          "value": "Command injection vulnerabilities exist in the command line interface (CLI) service accessed by the PAPI protocol of AOS-8 and AOS-10 Operating Systems. Successful exploitation of these vulnerabilities could allow an authenticated remote attacker to execute arbitrary commands on the underlying operating system.",
          "supportingMedia": [
            {
              "type": "text/html",
              "base64": false,
              "value": "<p>Command injection vulnerabilities exist in the command line interface (CLI) service accessed by the PAPI protocol of AOS-8 and AOS-10 Operating Systems. Successful exploitation of these vulnerabilities could allow an authenticated remote attacker to execute arbitrary commands on the underlying operating system.</p>"
            }
          ]
        }
      ],
      "affected": [
        {
          "vendor": "Hewlett Packard Enterprise (HPE)",
          "product": "HPE Aruba Networking Wireless Operating System (AOS)",
          "defaultStatus": "affected",
          "versions": [
            {
              "version": "8.13.0.0",
              "status": "affected",
              "versionType": "semver",
              "lessThanOrEqual": "8.13.1.1"
            },
            {
              "version": "8.12.0.0",
              "status": "affected",
              "versionType": "semver",
              "lessThanOrEqual": "8.12.0.6"
            },
            {
              "version": "8.10.0.0",
              "status": "affected",
              "versionType": "semver",
              "lessThanOrEqual": "8.10.0.21"
            },
            {
              "version": "10.7.0.0",
              "status": "affected",
              "versionType": "semver",
              "lessThanOrEqual": "10.7.2.2"
            },
            {
              "version": "10.8.0.0",
              "status": "affected",
              "versionType": "semver"
            },
            {
              "version": "10.4.0.0",
              "status": "affected",
              "versionType": "semver",
              "lessThanOrEqual": "10.4.1.10"
            }
          ]
        }
      ],
      "references": [
        {
          "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw05048en_us&docLocale=en_US"
        }
      ],
      "metrics": [
        {
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ],
          "cvssV3_1": {
            "version": "3.1",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "attackVector": "NETWORK",
            "attackComplexity": "LOW",
            "privilegesRequired": "HIGH",
            "userInteraction": "NONE",
            "scope": "UNCHANGED",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "availabilityImpact": "HIGH",
            "baseScore": 7.2,
            "baseSeverity": "HIGH"
          }
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "zzcentury",
          "type": "reporter"
        }
      ]
    }
  }
}